establishingsecurity / trustzone-rootkit
TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.
☆14Updated 2 years ago
Alternatives and similar repositories for trustzone-rootkit:
Users that are interested in trustzone-rootkit are comparing it to the libraries listed below
- CTF writeups☆9Updated 5 years ago
- ☆18Updated 3 years ago
- ☆14Updated 2 years ago
- IDA (sort of) headless☆24Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆25Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- Breaking Secure Boot with SMM☆40Updated 3 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 7 months ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated last year
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- A tool to perform so called BGE attack☆24Updated last year
- ☆13Updated 4 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 2 years ago
- ☆12Updated 3 years ago
- ☆33Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- ☆35Updated 4 years ago
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- binary ninja related code☆35Updated 3 weeks ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Ditto.☆17Updated 4 years ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆58Updated 2 years ago